Security analysis and procedure for generating our Cheetah STARK-friendly ellipctic curve (with prototype implementation).
Contributions to the FROST threshold signature scheme which add robustness, identifiability of cheating entities, among others.